openSUSE-SLE-15.5-2022-2956 Recommended update for post-build-checks moderate SUSE Updates openSUSE-SLE 15.5 This update for post-build-checks is a test update for openSUSE Leap 15.5. post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.noarch.rpm post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.src.rpm openSUSE-SLE-15.5-2022-4205 Security update for net-snmp moderate SUSE Updates openSUSE-SLE 15.5 This update for net-snmp fixes the following issues: Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203): - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access. - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference. - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously. - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access. - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference. - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. net-snmp-5.9.3-150300.15.3.1.src.rpm net-snmp-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-devel-5.9.3-150300.15.3.1.x86_64.rpm perl-SNMP-5.9.3-150300.15.3.1.x86_64.rpm python3-net-snmp-5.9.3-150300.15.3.1.x86_64.rpm snmp-mibs-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-5.9.3-150300.15.3.1.s390x.rpm net-snmp-devel-5.9.3-150300.15.3.1.s390x.rpm perl-SNMP-5.9.3-150300.15.3.1.s390x.rpm python3-net-snmp-5.9.3-150300.15.3.1.s390x.rpm snmp-mibs-5.9.3-150300.15.3.1.s390x.rpm net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm net-snmp-devel-5.9.3-150300.15.3.1.ppc64le.rpm perl-SNMP-5.9.3-150300.15.3.1.ppc64le.rpm python3-net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm snmp-mibs-5.9.3-150300.15.3.1.ppc64le.rpm net-snmp-5.9.3-150300.15.3.1.aarch64.rpm net-snmp-devel-5.9.3-150300.15.3.1.aarch64.rpm perl-SNMP-5.9.3-150300.15.3.1.aarch64.rpm python3-net-snmp-5.9.3-150300.15.3.1.aarch64.rpm snmp-mibs-5.9.3-150300.15.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-419 Security update for nodejs18 moderate SUSE Updates openSUSE-SLE 15.5 This update for nodejs18 fixes the following issues: This update ships nodejs18 (jsc#PED-2097) Update to NodejJS 18.13.0 LTS: * build: disable v8 snapshot compression by default * crypto: update root certificates * deps: update ICU to 72.1 * doc: + add doc-only deprecation for headers/trailers setters + add Rafael to the tsc + deprecate use of invalid ports in url.parse + deprecate url.parse() * lib: drop fetch experimental warning * net: add autoSelectFamily and autoSelectFamilyAttemptTimeout options * src: + add uvwasi version + add initial shadow realm support * test_runner: + add t.after() hook + don't use a symbol for runHook() * tls: + add "ca" property to certificate object * util: + add fast path for utf8 encoding + improve textdecoder decode performance + add MIME utilities - Fixes compatibility with ICU 72.1 (bsc#1205236) - Fix migration to openssl-3 (bsc#1205042) Update to NodeJS 18.12.1 LTS: * inspector: DNS rebinding in --inspect via invalid octal IP (bsc#1205119, CVE-2022-43548) Update to NodeJS 18.12.0 LTS: * Running in 'watch' mode using node --watch restarts the process when an imported file is changed. * fs: add FileHandle.prototype.readLines * http: add writeEarlyHints function to ServerResponse * http2: make early hints generic * util: add default value option to parsearg Update to NodeJS 18.11.0: * added experimental watch mode -- running in 'watch' mode using node --watch restarts the process when an imported file is changed * fs: add FileHandle.prototype.readLines * http: add writeEarlyHints function to ServerResponse * http2: make early hints generic * lib: refactor transferable AbortSignal * src: add detailed embedder process initialization API * util: add default value option to parsearg Update to NodeJS 18.10.0: * deps: upgrade npm to 8.19.2 * http: throw error on content-length mismatch * stream: add ReadableByteStream.tee() Update to Nodejs 18.9.1: * deps: llhttp updated to 6.0.10 + CVE-2022-32213 bypass via obs-fold mechanic (bsc#1201325) + Incorrect Parsing of Multi-line Transfer-Encoding (CVE-2022-32215, bsc#1201327) + Incorrect Parsing of Header Fields (CVE-2022-35256, bsc#1203832) * crypto: fix weak randomness in WebCrypto keygen (CVE-2022-35255, bsc#1203831) Update to Nodejs 18.9.0: * lib - add diagnostics channel for process and worker * os - add machine method * report - expose report public native apis * src - expose environment RequestInterrupt api * vm - include vm context in the embedded snapshot Changes in 18.8.0: * bootstrap: implement run-time user-land snapshots via --build-snapshot and --snapshot-blob. See * crypto: + allow zero-length IKM in HKDF and in webcrypto PBKDF2 + allow zero-length secret KeyObject * deps: upgrade npm to 8.18.0 * http: make idle http parser count configurable * net: add local family * src: print source map error source on demand * tls: pass a valid socket on tlsClientError Update to Nodejs 18.7.0: * events: add CustomEvent * http: add drop request event for http server * lib: improved diagnostics_channel subscribe/unsubscribe * util: add tokens to parseArgs - enable crypto policy ciphers for TW and SLE15 SP4+ (bsc#1200303) Update to Nodejs 18.6.0: * Experimental ESM Loader Hooks API. For details see, https://nodejs.org/api/esm.html * dns: export error code constants from dns/promises * esm: add chaining to loaders * http: add diagnostics channel for http client * http: add perf_hooks detail for http request and client * module: add isBuiltIn method * net: add drop event for net server * test_runner: expose describe and it * v8: add v8.startupSnapshot utils For details, see https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.6.0 Update to Nodejs 18.5.0: * http: stricter Transfer-Encoding and header separator parsing (bsc#1201325, bsc#1201326, bsc#1201327, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215) * src: fix IPv4 validation in inspector_socket (bsc#1201328, CVE-2022-32212) For details, see https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.5.0 Update to Nodejs 18.4.0. For detailed changes see, https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.4.0 Initial packaging of Nodejs 18.2.0. For detailed changes since previous versions, see https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V18.md#18.2.0 corepack18-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-18.13.0-150400.9.3.1.src.rpm nodejs18-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-devel-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-docs-18.13.0-150400.9.3.1.noarch.rpm npm18-18.13.0-150400.9.3.1.x86_64.rpm corepack18-18.13.0-150400.9.3.1.s390x.rpm nodejs18-18.13.0-150400.9.3.1.s390x.rpm nodejs18-devel-18.13.0-150400.9.3.1.s390x.rpm npm18-18.13.0-150400.9.3.1.s390x.rpm corepack18-18.13.0-150400.9.3.1.aarch64.rpm nodejs18-18.13.0-150400.9.3.1.aarch64.rpm nodejs18-devel-18.13.0-150400.9.3.1.aarch64.rpm npm18-18.13.0-150400.9.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-1954 Recommended update for xmlsec1 low SUSE Updates openSUSE-SLE 15.5 This update for xmlsec1 fixes the following issue: - Ship missing xmlsec1 to synchronize its version across different products (bsc#1201617) libxmlsec1-1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-1.2.28-150100.7.13.4.src.rpm xmlsec1-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.aarch64.rpm openSUSE-SLE-15.5-2023-2383 Recommended update for jansi moderate SUSE Updates openSUSE-SLE 15.5 This update for jansi contains the following fix: - Fetch sources using source_service and don't distribute legally spurious files. (bsc#1210877) jansi-2.4.0-150200.3.7.1.src.rpm jansi-2.4.0-150200.3.7.1.x86_64.rpm jansi-javadoc-2.4.0-150200.3.7.1.noarch.rpm jansi-2.4.0-150200.3.7.1.s390x.rpm jansi-2.4.0-150200.3.7.1.ppc64le.rpm jansi-2.4.0-150200.3.7.1.aarch64.rpm openSUSE-SLE-15.5-2023-2296 Security update for openvswitch important SUSE Updates openSUSE-SLE 15.5 This update for openvswitch fixes the following issues: - CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054). libopenvswitch-2_14-0-2.14.2-150400.24.9.1.x86_64.rpm libovn-20_06-0-20.06.2-150400.24.9.1.x86_64.rpm openvswitch-2.14.2-150400.24.9.1.src.rpm openvswitch-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-devel-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-doc-2.14.2-150400.24.9.1.noarch.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-pki-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-test-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-vtep-2.14.2-150400.24.9.1.x86_64.rpm ovn-20.06.2-150400.24.9.1.x86_64.rpm ovn-central-20.06.2-150400.24.9.1.x86_64.rpm ovn-devel-20.06.2-150400.24.9.1.x86_64.rpm ovn-doc-20.06.2-150400.24.9.1.noarch.rpm ovn-docker-20.06.2-150400.24.9.1.x86_64.rpm ovn-host-20.06.2-150400.24.9.1.x86_64.rpm ovn-vtep-20.06.2-150400.24.9.1.x86_64.rpm python3-ovs-2.14.2-150400.24.9.1.x86_64.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.s390x.rpm libovn-20_06-0-20.06.2-150400.24.9.1.s390x.rpm openvswitch-2.14.2-150400.24.9.1.s390x.rpm openvswitch-devel-2.14.2-150400.24.9.1.s390x.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.s390x.rpm openvswitch-pki-2.14.2-150400.24.9.1.s390x.rpm openvswitch-test-2.14.2-150400.24.9.1.s390x.rpm openvswitch-vtep-2.14.2-150400.24.9.1.s390x.rpm ovn-20.06.2-150400.24.9.1.s390x.rpm ovn-central-20.06.2-150400.24.9.1.s390x.rpm ovn-devel-20.06.2-150400.24.9.1.s390x.rpm ovn-docker-20.06.2-150400.24.9.1.s390x.rpm ovn-host-20.06.2-150400.24.9.1.s390x.rpm ovn-vtep-20.06.2-150400.24.9.1.s390x.rpm python3-ovs-2.14.2-150400.24.9.1.s390x.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.ppc64le.rpm libovn-20_06-0-20.06.2-150400.24.9.1.ppc64le.rpm openvswitch-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-devel-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-pki-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-test-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-vtep-2.14.2-150400.24.9.1.ppc64le.rpm ovn-20.06.2-150400.24.9.1.ppc64le.rpm ovn-central-20.06.2-150400.24.9.1.ppc64le.rpm ovn-devel-20.06.2-150400.24.9.1.ppc64le.rpm ovn-docker-20.06.2-150400.24.9.1.ppc64le.rpm ovn-host-20.06.2-150400.24.9.1.ppc64le.rpm ovn-vtep-20.06.2-150400.24.9.1.ppc64le.rpm python3-ovs-2.14.2-150400.24.9.1.ppc64le.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.aarch64.rpm libovn-20_06-0-20.06.2-150400.24.9.1.aarch64.rpm openvswitch-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-devel-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-pki-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-test-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-vtep-2.14.2-150400.24.9.1.aarch64.rpm ovn-20.06.2-150400.24.9.1.aarch64.rpm ovn-central-20.06.2-150400.24.9.1.aarch64.rpm ovn-devel-20.06.2-150400.24.9.1.aarch64.rpm ovn-docker-20.06.2-150400.24.9.1.aarch64.rpm ovn-host-20.06.2-150400.24.9.1.aarch64.rpm ovn-vtep-20.06.2-150400.24.9.1.aarch64.rpm python3-ovs-2.14.2-150400.24.9.1.aarch64.rpm openSUSE-SLE-15.5-2023-2313 Security update for c-ares important SUSE Updates openSUSE-SLE 15.5 This update for c-ares fixes the following issues: Update to version 1.19.1: - CVE-2023-32067: 0-byte UDP payload causes Denial of Service (bsc#1211604) - CVE-2023-31147: Insufficient randomness in generation of DNS query IDs (bsc#1211605) - CVE-2023-31130: Buffer Underwrite in ares_inet_net_pton() (bsc#1211606) - CVE-2023-31124: AutoTools does not set CARES_RANDOM_FILE during cross compilation (bsc#1211607) - Fix uninitialized memory warning in test - ares_getaddrinfo() should allow a port of 0 - Fix memory leak in ares_send() on error - Fix comment style in ares_data.h - Fix typo in ares_init_options.3 - Sync ax_pthread.m4 with upstream - Sync ax_cxx_compile_stdcxx_11.m4 with upstream to fix uclibc support c-ares-1.19.1-150000.3.23.1.src.rpm c-ares-devel-1.19.1-150000.3.23.1.x86_64.rpm c-ares-utils-1.19.1-150000.3.23.1.x86_64.rpm libcares2-1.19.1-150000.3.23.1.x86_64.rpm libcares2-32bit-1.19.1-150000.3.23.1.x86_64.rpm c-ares-devel-1.19.1-150000.3.23.1.s390x.rpm c-ares-utils-1.19.1-150000.3.23.1.s390x.rpm libcares2-1.19.1-150000.3.23.1.s390x.rpm c-ares-devel-1.19.1-150000.3.23.1.ppc64le.rpm c-ares-utils-1.19.1-150000.3.23.1.ppc64le.rpm libcares2-1.19.1-150000.3.23.1.ppc64le.rpm c-ares-devel-1.19.1-150000.3.23.1.aarch64.rpm c-ares-utils-1.19.1-150000.3.23.1.aarch64.rpm libcares2-1.19.1-150000.3.23.1.aarch64.rpm openSUSE-SLE-15.5-2023-2390 Security update for apache-commons-fileupload important SUSE Updates openSUSE-SLE 15.5 This update for apache-commons-fileupload fixes the following issues: Updated to version 1.5: - CVE-2023-24998: Added a configurable maximum number of files to upload per request (bsc#1208513). apache-commons-fileupload-1.5-150200.3.9.1.noarch.rpm apache-commons-fileupload-1.5-150200.3.9.1.src.rpm apache-commons-fileupload-javadoc-1.5-150200.3.9.1.noarch.rpm openSUSE-SLE-15.5-2023-2312 Security update for go1.18-openssl important SUSE Updates openSUSE-SLE 15.5 This update for go1.18-openssl fixes the following issues: - Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962) * Main go1.x package included libstd.so in previous versions * Split libstd.so into subpackage that can be installed standalone * Continues the slimming down of main go1.x package by 40 Mb * Experimental and not recommended for general use, Go currently has no ABI * Upstream Go has not committed to support buildmode=shared long-term * Do not use in packaging, build static single binaries (the default) * Upstream Go go1.x binary releases do not include libstd.so * go1.x Suggests go1.x-libstd so not installed by default Recommends * go1.x-libstd does not Require: go1.x so can install standalone * Provides go-libstd unversioned package name * Fix build step -buildmode=shared std to omit -linkshared - Packaging improvements: * go1.x Suggests go1.x-doc so not installed by default Recommends * Use Group: Development/Languages/Go instead of Other - Improvements to go1.x packaging spec: * On Tumbleweed bootstrap with current default gcc13 and gccgo118 * On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap using go1.x package (%bcond_without gccgo). This is no longer needed on current SLE-12:Update and removing will consolidate the build configurations used. * Change source URLs to go.dev as per Go upstream * On x86_64 export GOAMD64=v1 as per the current baseline. At this time forgo GOAMD64=v3 option for x86_64_v3 support. * On x86_64 %define go_amd64=v1 as current instruction baseline - Update to version 1.18.10.1 cut from the go1.18-openssl-fips branch at the revision tagged go1.18.10-1-openssl-fips. * Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips * Merge go1.18.10 into dev.boringcrypto.go1.18 - go1.18.10 (released 2023-01-10) includes fixes to cgo, the compiler, the linker, and the crypto/x509, net/http, and syscall packages. Refs bsc#1193742 go1.18 release tracking * go#57705 misc/cgo: backport needed for dlltool fix * go#57426 crypto/x509: Verify on macOS does not return typed errors * go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its "old" argument. * go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices * go#57213 os: TestLstat failure on Linux Aarch64 * go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length * go#57057 cmd/go: remove test dependency on gopkg.in service * go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders * go#57044 cgo: malformed DWARF TagVariable entry * go#57028 cmd/cgo: Wrong types in compiler errors with clang 14 * go#56833 cmd/link/internal/ppc64: too-far trampoline is reused * go#56711 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target * go#56323 net/http: bad handling of HEAD requests with a body go1.18-openssl-1.18.10.1-150000.1.9.1.src.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-race-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.s390x.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.s390x.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.ppc64le.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.ppc64le.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.aarch64.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.aarch64.rpm go1.18-openssl-race-1.18.10.1-150000.1.9.1.aarch64.rpm openSUSE-SLE-15.5-2023-2347 Security update for cups important SUSE Updates openSUSE-SLE 15.5 This update for cups fixes the following issues: - CVE-2023-32324: Fixed a buffer overflow in format_log_line() which could cause a denial-of-service (bsc#1211643). cups-2.2.7-150000.3.43.1.src.rpm cups-2.2.7-150000.3.43.1.x86_64.rpm cups-client-2.2.7-150000.3.43.1.x86_64.rpm cups-config-2.2.7-150000.3.43.1.x86_64.rpm cups-ddk-2.2.7-150000.3.43.1.x86_64.rpm cups-devel-2.2.7-150000.3.43.1.x86_64.rpm cups-devel-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcups2-2.2.7-150000.3.43.1.x86_64.rpm libcups2-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupscgi1-2.2.7-150000.3.43.1.x86_64.rpm libcupscgi1-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupsimage2-2.2.7-150000.3.43.1.x86_64.rpm libcupsimage2-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupsmime1-2.2.7-150000.3.43.1.x86_64.rpm libcupsmime1-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupsppdc1-2.2.7-150000.3.43.1.x86_64.rpm libcupsppdc1-32bit-2.2.7-150000.3.43.1.x86_64.rpm cups-2.2.7-150000.3.43.1.s390x.rpm cups-client-2.2.7-150000.3.43.1.s390x.rpm cups-config-2.2.7-150000.3.43.1.s390x.rpm cups-ddk-2.2.7-150000.3.43.1.s390x.rpm cups-devel-2.2.7-150000.3.43.1.s390x.rpm libcups2-2.2.7-150000.3.43.1.s390x.rpm libcupscgi1-2.2.7-150000.3.43.1.s390x.rpm libcupsimage2-2.2.7-150000.3.43.1.s390x.rpm libcupsmime1-2.2.7-150000.3.43.1.s390x.rpm libcupsppdc1-2.2.7-150000.3.43.1.s390x.rpm cups-2.2.7-150000.3.43.1.ppc64le.rpm cups-client-2.2.7-150000.3.43.1.ppc64le.rpm cups-config-2.2.7-150000.3.43.1.ppc64le.rpm cups-ddk-2.2.7-150000.3.43.1.ppc64le.rpm cups-devel-2.2.7-150000.3.43.1.ppc64le.rpm libcups2-2.2.7-150000.3.43.1.ppc64le.rpm libcupscgi1-2.2.7-150000.3.43.1.ppc64le.rpm libcupsimage2-2.2.7-150000.3.43.1.ppc64le.rpm libcupsmime1-2.2.7-150000.3.43.1.ppc64le.rpm libcupsppdc1-2.2.7-150000.3.43.1.ppc64le.rpm cups-2.2.7-150000.3.43.1.aarch64.rpm cups-client-2.2.7-150000.3.43.1.aarch64.rpm cups-config-2.2.7-150000.3.43.1.aarch64.rpm cups-ddk-2.2.7-150000.3.43.1.aarch64.rpm cups-devel-2.2.7-150000.3.43.1.aarch64.rpm libcups2-2.2.7-150000.3.43.1.aarch64.rpm libcupscgi1-2.2.7-150000.3.43.1.aarch64.rpm libcupsimage2-2.2.7-150000.3.43.1.aarch64.rpm libcupsmime1-2.2.7-150000.3.43.1.aarch64.rpm libcupsppdc1-2.2.7-150000.3.43.1.aarch64.rpm openSUSE-SLE-15.5-2023-2334 Security update for tiff moderate SUSE Updates openSUSE-SLE 15.5 This update for tiff fixes the following issues: Fixed multiple out of bounds read/write security issues: CVE-2023-0795 (bsc#1208226), CVE-2023-0796 (bsc#1208227), CVE-2023-0797 (bsc#1208228), CVE-2023-0798 (bsc#1208229), CVE-2023-0799 (bsc#1208230), CVE-2023-0800 (bsc#1208231), CVE-2023-0801 (bsc#1208232), CVE-2023-0802 (bsc#1208233), CVE-2023-0803 (bsc#1208234), CVE-2023-0804 (bsc#1208236). libtiff-devel-32bit-4.0.9-150000.45.28.1.x86_64.rpm libtiff-devel-4.0.9-150000.45.28.1.x86_64.rpm libtiff5-32bit-4.0.9-150000.45.28.1.x86_64.rpm libtiff5-4.0.9-150000.45.28.1.x86_64.rpm tiff-4.0.9-150000.45.28.1.src.rpm tiff-4.0.9-150000.45.28.1.x86_64.rpm libtiff-devel-4.0.9-150000.45.28.1.s390x.rpm libtiff5-4.0.9-150000.45.28.1.s390x.rpm tiff-4.0.9-150000.45.28.1.s390x.rpm libtiff-devel-4.0.9-150000.45.28.1.ppc64le.rpm libtiff5-4.0.9-150000.45.28.1.ppc64le.rpm tiff-4.0.9-150000.45.28.1.ppc64le.rpm libtiff-devel-4.0.9-150000.45.28.1.aarch64.rpm libtiff5-4.0.9-150000.45.28.1.aarch64.rpm tiff-4.0.9-150000.45.28.1.aarch64.rpm openSUSE-SLE-15.5-2023-2331 Security update for openssl-1_0_0 important SUSE Updates openSUSE-SLE 15.5 This update for openssl-1_0_0 fixes the following issues: - CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430). libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl10-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-32bit-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.76.1.x86_64.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.src.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.x86_64.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.x86_64.rpm openssl-1_0_0-doc-1.0.2p-150000.3.76.1.noarch.rpm libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.s390x.rpm libopenssl10-1.0.2p-150000.3.76.1.s390x.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.s390x.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.s390x.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.s390x.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.s390x.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.s390x.rpm libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl10-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.ppc64le.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.ppc64le.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl10-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.aarch64.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.aarch64.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.aarch64.rpm openSUSE-SLE-15.5-2023-2320 Security update for wireshark moderate SUSE Updates openSUSE-SLE 15.5 This update for wireshark fixes the following issues: Updated to version 3.6.14: - CVE-2023-2855: Fixed a crash in the Candump log file parser (boo#1211703). - CVE-2023-2856: Fixed a crash in the VMS TCPIPtrace file parser (boo#1211707). - CVE-2023-2857: Fixed a crash in the BLF file parser (boo#1211705). - CVE-2023-2858: Fixed a crash in the NetScaler file parser (boo#1211706). - CVE-2023-0668: Fixed a crash in the IEEE C37.118 Synchrophasor dissector (boo#1211710). - CVE-2023-2879: GDSDB dissector infinite loop (boo#1211793). Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.14.html libwireshark15-3.6.14-150000.3.92.1.x86_64.rpm libwiretap12-3.6.14-150000.3.92.1.x86_64.rpm libwsutil13-3.6.14-150000.3.92.1.x86_64.rpm wireshark-3.6.14-150000.3.92.1.src.rpm wireshark-3.6.14-150000.3.92.1.x86_64.rpm wireshark-devel-3.6.14-150000.3.92.1.x86_64.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.x86_64.rpm libwireshark15-3.6.14-150000.3.92.1.s390x.rpm libwiretap12-3.6.14-150000.3.92.1.s390x.rpm libwsutil13-3.6.14-150000.3.92.1.s390x.rpm wireshark-3.6.14-150000.3.92.1.s390x.rpm wireshark-devel-3.6.14-150000.3.92.1.s390x.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.s390x.rpm libwireshark15-3.6.14-150000.3.92.1.ppc64le.rpm libwiretap12-3.6.14-150000.3.92.1.ppc64le.rpm libwsutil13-3.6.14-150000.3.92.1.ppc64le.rpm wireshark-3.6.14-150000.3.92.1.ppc64le.rpm wireshark-devel-3.6.14-150000.3.92.1.ppc64le.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.ppc64le.rpm libwireshark15-3.6.14-150000.3.92.1.aarch64.rpm libwiretap12-3.6.14-150000.3.92.1.aarch64.rpm libwsutil13-3.6.14-150000.3.92.1.aarch64.rpm wireshark-3.6.14-150000.3.92.1.aarch64.rpm wireshark-devel-3.6.14-150000.3.92.1.aarch64.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.aarch64.rpm openSUSE-SLE-15.5-2023-2381 Recommended update for bouncycastle moderate SUSE Updates openSUSE-SLE 15.5 This update for bouncycastle fixes the following issues: bouncycastle was updated to version 1.73: [jsc#PED-3756] Defects Fixed: - BCJSSE: Instantiating a JSSE provider in some contexts could cause an AccessControl exception. - The EC key pair generator can generate out of range private keys when used with SM2. A specific SM2KeyPairGenerator has been added to the low-level API and is used by KeyPairGenerator.getInstance("SM2", "BC"). The SM2 signer has been updated to check for out of range keys as well.. - The attached signature type byte was still present in Falcon signatures as well as the detached signature byte. - There was an off-by-one error in engineGetOutputSize() for ECIES. - The method for invoking read() internally in BCPGInputStream could result in inconsistent behaviour if the class was extended. - Fixed a rounding issue with FF1 Format Preserving Encryption algorithm for certain radices. - Fixed RFC3394WrapEngine handling of 64 bit keys. - Internal buffer for blake2sp was too small and could result in an ArrayIndexOutOfBoundsException. - JCA PSS Signatures using SHAKE128 and SHAKE256 now support encoding of algorithm parameters. - PKCS10CertificationRequest now checks for empty extension parameters. - Parsing errors in the processing of PGP Armored Data now throw an explicit exception ArmoredInputException. - PGP AEAD streams could occassionally be truncated. - The ESTService class now supports processing of chunked HTTP data. - A constructed ASN.1 OCTET STRING with a single member would sometimes be re-encoded as a definite-length OCTET STRING. The encoding has been adjusted to preserve the BER status of the object. - PKIXCertPathReviewer could fail if the trust anchor was also included in the certificate store being used for path analysis. - UTF-8 parsing of an array range ignored the provided length. - IPAddress has been written to provide stricter checking and avoid the use of Integer.parseInt(). - A Java 7 class snuck into the Java 5 to Java 8 build. Additional Features and Functionality: - The Rainbow NIST Post Quantum Round-3 Candidate has been added to the low-level API and the BCPQC provider (level 3 and level 5 parameter sets only). - The GeMSS NIST Post Quantum Round-3 Candidate has been added to the low-level API. - The org.bouncycastle.rsa.max_mr_tests property check has been added to allow capping of MR tests done on RSA moduli. - Significant performance improvements in PQC algorithms, especially BIKE, CMCE, Frodo, HQC, Picnic. - EdDSA verification now conforms to the recommendations of Taming the many EdDSAs, in particular cofactored verification. As a side benefit, Pornin's basis reduction is now used for EdDSA verification, giving a significant performance boost. - Major performance improvements for Anomalous Binary (Koblitz) Curves. - The lightweight Cryptography finalists Ascon, ISAP, Elephant, PhotonBeetle, Sparkle, and Xoodyak have been added to the light-weight cryptography API. - BLAKE2bp and BLAKE2sp have been added to the light-weight cryptography API. - Support has been added for X.509, Section 9.8, hybrid certificates and CRLs using alternate public keys and alternate signatures. - The property "org.bouncycastle.emulate.oracle" has been added to signal the provider should return algorithm names on some algorithms in the same manner as the Oracle JCE provider. - An extra replaceSigners method has been added to CMSSignedData which allows for specifying the digest algorithm IDs to be used in the new CMSSignedData object. - Parsing and re-encoding of ASN.1 PEM data has been further optimized to prevent unecessary conversions between basic encoding, definite length, and DER. - Support has been added for KEM ciphers in CMS in accordance with draft-ietf-lamps-cms-kemri - Support has been added for certEncr in CRMF to allow issuing of certificates for KEM public keys. - Further speedups have been made to CRC24. - GCMParameterSpec constructor caching has been added to improve performance for JVMs that have the class available. - The PGPEncrytedDataGenerator now supports injecting the session key to be used for PGP PBE encrypted data. - The CRMF CertificateRequestMessageBuilder now supports optional attributes. - Improvements to the s calculation in JPAKE. - A general purpose PQCOtherInfoGenerator has been added which supports all Kyber and NTRU. - An implementation of HPKE (RFC 9180 - Hybrid Public Key Encryption) has been added to the light-weight cryptography API. Security Advisories: - The PQC implementations have now been subject to formal review for secret leakage and side channels, there were issues in BIKE, Falcon, Frodo, HQC which have now been fixed. Some weak positives also showed up in Rainbow, Picnic, SIKE, and GeMSS - for now this last set has been ignored as the algorithms will either be updated if they reappear in the Signature Round, or deleted, as is already the case for SIKE (it is now in the legacy package). Details on the group responsible for the testing can be found in the CONTRIBUTORS file. - For at least some ECIES variants (e.g. when using CBC) there is an issue with potential malleability of a nonce (implying silent malleability of the plaintext) that must be sent alongside the ciphertext but is outside the IES integrity check. For this reason the automatic generation of nonces with IED is now disabled and they have to be passed in using an IESParameterSpec. The current advice is to agree on a nonce between parties and then rely on the use of the ephemeral key component to allow the nonce (rather the so called nonce) usage to be extended. bouncycastle-1.73-150200.3.18.1.noarch.rpm bouncycastle-1.73-150200.3.18.1.src.rpm bouncycastle-javadoc-1.73-150200.3.18.1.noarch.rpm bouncycastle-jmail-1.73-150200.3.18.1.noarch.rpm bouncycastle-mail-1.73-150200.3.18.1.noarch.rpm bouncycastle-pg-1.73-150200.3.18.1.noarch.rpm bouncycastle-pkix-1.73-150200.3.18.1.noarch.rpm bouncycastle-tls-1.73-150200.3.18.1.noarch.rpm bouncycastle-util-1.73-150200.3.18.1.noarch.rpm openSUSE-SLE-15.5-2023-2344 Security update for ImageMagick important SUSE Updates openSUSE-SLE 15.5 This update for ImageMagick fixes the following issues: - CVE-2023-34151: Fixed an undefined behavior issue due to floating point truncation (bsc#1211791). - CVE-2023-34153: Fixed a command injection issue when encoding or decoding VIDEO files (bsc#1211792). ImageMagick-7.1.0.9-150400.6.21.1.src.rpm ImageMagick-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-devel-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-doc-7.1.0.9-150400.6.21.1.noarch.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-devel-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.s390x.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.s390x.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.s390x.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.s390x.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.s390x.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.ppc64le.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.aarch64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.aarch64.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.aarch64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.aarch64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.aarch64.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.aarch64.rpm